Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/03/2025, 09:01
General
-
Target
cheat.exe
-
Size
197KB
-
MD5
6b60d478dc59ba2d30610d57d36a929b
-
SHA1
0b9240afd4338b4ec6608ea1a2ad4624fe02b1d8
-
SHA256
e6a07c0c643535a9b65fb286f4fafce14fafef0b830557e2d67f91f06ae2bbbc
-
SHA512
15967a5595bd8a2d413628a4d4d35f5bf60c3b4529c0d17216d43620918c386de1893e621985e8b04a508353e675f23b857c7fea11fe12aa247f0812626c2d4e
-
SSDEEP
3072:od9kkHFE9jM/Oju8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLns:oFE9wUhcX7elbKTuq9bfF/H9d9n
Malware Config
Extracted
xworm
5.0
ohsorry-20836.portmap.host:20836
BV3jFFIYrb13VXbT
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/4704-1-0x0000000000D60000-0x0000000000D96000-memory.dmp family_xworm -
Xworm family
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4704 cheat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2180 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cheat.exe"C:\Users\Admin\AppData\Local\Temp\cheat.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:572
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:4840
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2180
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\dd240bcf-0454-46ce-9b22-4cbfecc6341a.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize25KB
MD55417b341b1d2d5c87bbaf74821ff593f
SHA1acafa0fde967d4b2ada5f1c72d77b00e8a3e75dc
SHA2569733014a1bf6a19dec391c542adffdca2102fb4ebf92c7086ff7ea92b3b00fe5
SHA5126c6948c81f5804d7a2b5db9c4c1a12f9d81ed74173baf3ea3f685a36b531b19ed47d0ce2f391b42b6182eefae204ccc97bc63c611c4b375fc3350174da4700fa